Biometric technology
-
Upload
saikumar-madugula -
Category
Technology
-
view
78 -
download
0
Transcript of Biometric technology
BIOMETRIC TECHNOLOGY
Objectives1) What is a Biometric ?2) Various Types of Biometric3) History of Biometric4) Working & Authentication process5) Advantages and Disadvantages6) Applications7) Conclusion
What is a Biometric ??? Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, voice waves, DNA, and signatures.
History of Biometric TechnologyThe term “biometrics” is derived from
the Greek words “bio” (life) and “metrics” (to measure).
Biometric is the automated process of identifying or verifying an individual based upon his or her behavioral or physical characteristics.
1858 – First systematic capture of hand images for identification purposes is recorded by Sir William Herschel
William Herschel
1936 – Concept of using the iris pattern for identification is proposed
frank burch
What is Authentication ???Authentication is the act of
confirming something what it claims to be.
It is the process of giving someone identity so that he or she can access that particular application or data.
For e.g.: giving identity-card to a student of an institute.
Authentication
Main Types of AuthenticationBy using passwords, PIN
By using smart card or swipe card
By using Biometric
Mode of Biometric SystemIdentification One-to-many comparison It search for a sample against a database of
templates It identifies an unknown individual. For e.g.: who is “x”?
Verification One-to-one comparison It compares a sample against a single stored
template It verifies that the individual is who he claims to be For e.g.: is this “x”?
Working of biometric systemSteps:CapturingPre-processingFeature extractionTemplate matchingMatcher/ComparisonApplication Device
Working processEnrollment: In this stage, the information
captured from the subject by the sensing device is stored in a database for later comparison. When someone uses biometric for the first time then the stage is called enrollment.
Contd…Authentication: In this stage, the
registered biometric sample during the enrollment process are matched against newly capturing biometric sample.
Biometric devices consist ofA scanning device
A software which converts scanned information into digital forms and compares on some matching points
A database that stores biometric features for further comparison
Different biometric techniqueFingerprint technology: It is the oldest and most widely used method.It needs a fingerprint reader.Registered points are located and compared.Optical sensors are used for scanning purpose.It can be used for many applications like pc login
security, voting system, attendance system etc.
Contd..Uses the ridge endings and bifurcation's on a
persons finger to plot points known as MinutiaeThe number and locations of the minutiae vary
from finger to finger in any particular person, and from person to person for any particular finger
Finger Image + MinutiaeFinger Image Minutiae
Face recognition technology Face Recognition is a biometric technique for
automatic identification or verification of a person from a digital image.
These include the position/size/shape of the eyes, nose, cheekbones and jaw line.
Facial Recognition1. Capture image
2. Find face in image
3. Extract features (store template)
4. Compare templates
5. Declare matches
Iris Recognition TechnologyIt measures the iris pattern of the eye i.e.
the colored part of the eye that surrounds the pupil.
The iris canner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil.
Iris pattern is not changed over years or by glasses, contact lens
Iris recognitionIris scanning measures the iris pattern in the colored part of the eye,
Retina recognition
Images back of the eye and compares blood vessels with existing data
Hand Geometry TechnologyThis method uses hand images for
person identification or verification.Person identification using hand
geometry utilizes hand images to extract a number of features such as finger length, width, thickness, finger area etc.
Measures the digits of the hand and compares to those collected at the time of enrollment.
Contd..Places hand on the system, which
takes the three dimensional image of the hand.
Speaker recognition technologyVoice Recognition or Speaker Recognition is a
biometric process of validating a user's claimed identity using characteristics extracted from their voices.
It uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes.
A telephone or microphone can act as a sensor.
Contd.. During the enrollment phase, the spoken words are
converted from analog to digital format, and the distinctive vocal characteristics such as pitch, frequency, and tone, are extracted, and a speaker model is established.
A template is then generated and stored for future comparisons.
Speaker recognition is often used where voice is the only available biometric identifier, such as telephone.
Keystroke dynamicsKeystroke dynamics is an automated method of examining an individual’s keystrokes on a keyboard.
This technology examines such dynamicsas speed and pressure, the total time taken to type particular words, and the time elapsed between hitting certain keys.
Comparison Between Different Technique
Biometrics cannot be lost, stolen or forgotten. Barring disease or serious physical injury, the biometric is consistent and permanent.
It is also secure in that the biometric itself cannot be socially engineered, shared or used by others.
There is no requirement to remember passwords, or PINs, thus eliminating an overhead cost. The biometric is always available to the individual;
Coupled with a smart card, biometrics provide strong security for any credentials on the smart card.
Biometric system provide a high degree of confidence in user identity.
Organizations can implement recognition systems to obviate the need to log onto a system manually.
advantage of biometrics
Lack of standardizationWhile the reliability and the accuracy of biometric
devices continues to improve.Biometric systems must be able to accommodate
changes to the biometric over time which may be caused by ageing, illness or injury.
The effectiveness of the sample collection process is strongly influenced by environmental conditions, user training and usability. For example, lighting, facial orientations, expression, image resolution and the wearing of hats can affect the quality of the sample.
disadvantages
Applications of Biometricpresently using Vertical markets that are using
biometrics:Government—Passports, national
identification (ID) cards, voter cards, driver’s licenses, social services, and so on
✓ Transportation—Airport security, boarding passes, and commercial driver’s licenses
✓ Healthcare—Medical insurance cards, patient/employee identity cards
✓ Financial—Bankcards, ATM cards, credit cards, and debit cards
✓ Security—Access control and identity verifications, including time and attendance
✓ Education—Student/teacher identity verification and access control. Biometrics are now being implemented in large-scale ID systems around the globe.
Future using and existing Biometrics is a rapidly evolving
technology that is being widely used in forensics, such as criminal identification and prison security, and that has the potential to be used in a large range of civilian application areas.
Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks.
It can be used during transactions conducted by telephone and Internet (electronic commerce and electronic banking).
In automobiles, biometrics can replace keys with keyless entry devices.
conclusion
The upcoming lead in technology
Any queries